472,353 Members | 1,854 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 472,353 software developers and data experts.

Laptop fingerprint scanner working with

Hi everyone!

I need to create an app to interact with my laptop fingerprint scanner, for my university project. What should I use to write software for my fingerprint scanner? Any libraries, API, etc. I use lenovo t480 laptop, OS: Ubuntu Linux. There is a fingerprint scanner embedded in it.

lsusb shows my fingerprint scanner as Synaptics Metallica MOH Touch Fingerprint Reader.

I want to process fingerprint -- get, store and check -- programmatically, with code on Python, C or C++. If someone provides me information about:
1) how to programmatically interact with my laptop fingerprint scanner
2) what API or libraries (python, c or c++) should I use
it will be ideal :)
Mar 23 '21 #1
1 4661
SwissProgrammer
220 128KB
Lenovo t480 laptop.

This might be contingent upon if the operating system can see it and access it. Not just detect that it is there, but use it. If it can, then search for how the operating system accesses it.

Or, separately it might be contingent upon if you have UEFI anywhere on you laptop (anywhere on it).

If the current OS can not use the fingerprint scanner, then install the original version of the original OS on the laptop and work from there. I expect that the scanner might have an infrared heat detector that detects a finger near to the scanner then takes one or more photographs of what is in front of the scanner. Then a program parses those images into pixels and analyzes those pixels.

If you can override the infrared detector and activate the scanner's camera, then you might be able to use the fingerprint scanner to take pictures of who and what is in front of the laptop any and all time that it is on. If you have UEFI on your laptop then you might be able to run it without the operating system even booting up and take pictures 24 hours a day wherever the laptop goes. To work, to the bathroom, a clothes changing room, to a special secret meeting, etc. It was put there to take pictures automatically.

Tell us how you are doing with this.

I would expect C or almost any version of C++ to work with this.

You might have to study how UEFI actively spys on systems and users by design. There are many versions of UEFI and many are manufacturer designed. They should not be too complicated to work with or replace with your own version.

If your question is to learn how to stop the fingerprint scanner from spying, then I think that the best way is with a soldering iron and/or at least wire cutters. Same with some other things that are on the t480 and other similar laptops.
Mar 29 '21 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

3
by: S. van Beek | last post by:
Dear reader, To work with linked tables is a professional method of working with a frond end and back end mdb. Working with linked tables...
2
by: S. van Beek | last post by:
Dear reader, By working with a frond-end and back-end databases with the use of linked tables the performance, if both mdb's are on a local...
9
by: Tom | last post by:
I am working with the this object as oppose to the StreamReader object becuase I need to access a file (to find the contents) while an external...
8
by: Hardy Wang | last post by:
Hi: Is it possible for me to create/open web application from remote machine other than port 80? And create application directly under virtual web...
1
by: Magnus Blomberg | last post by:
Hello! When loading a path with spaces to Image.ImageURL from an SQL database, the picture is not shown. The path in the Image becomes...
6
by: Matt Frame | last post by:
I have a client that has asked us to get a digital signature certificate and start digitally signing all files we pass between each other. I have...
6
by: Michael Trausch | last post by:
Hello everyone, I'm having a little bit of trouble trying to implement some arithmetic logic into an application that I'm working on, and I'm...
3
by: PeterKellner | last post by:
I have a project where a html designer gives me a pile of html to wire up. I do that and it works fine of course. Then, the html designer makes...
1
by: pbak | last post by:
Hai! I am working with INET Control in Vb(Internet transfer Control) Actual Domain Recieving Data from Weighing Scale I...
0
by: yojeiramnj | last post by:
i'm only a beginner in programming so please extend more help. I have a digitalpersona fingerprint scanner and i have to develop a fingerprint...
0
jalbright99669
by: jalbright99669 | last post by:
Am having a bit of a time with URL Rewrite. I need to incorporate http to https redirect with a reverse proxy. I have the URL Rewrite rules made...
0
by: Matthew3360 | last post by:
Hi there. I have been struggling to find out how to use a variable as my location in my header redirect function. Here is my code. ...
0
by: AndyPSV | last post by:
HOW CAN I CREATE AN AI with an .executable file that would suck all files in the folder and on my computerHOW CAN I CREATE AN AI with an .executable...
0
by: Arjunsri | last post by:
I have a Redshift database that I need to use as an import data source. I have configured the DSN connection using the server, port, database, and...
0
hi
by: WisdomUfot | last post by:
It's an interesting question you've got about how Gmail hides the HTTP referrer when a link in an email is clicked. While I don't have the specific...
0
by: Matthew3360 | last post by:
Hi, I have been trying to connect to a local host using php curl. But I am finding it hard to do this. I am doing the curl get request from my web...
0
Oralloy
by: Oralloy | last post by:
Hello Folks, I am trying to hook up a CPU which I designed using SystemC to I/O pins on an FPGA. My problem (spelled failure) is with the...
0
BLUEPANDA
by: BLUEPANDA | last post by:
At BluePanda Dev, we're passionate about building high-quality software and sharing our knowledge with the community. That's why we've created a SaaS...
0
by: Rahul1995seven | last post by:
Introduction: In the realm of programming languages, Python has emerged as a powerhouse. With its simplicity, versatility, and robustness, Python...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.